ACAS STAN-EVAL NOTES-STUDY EXAM
QUESTIONS AND ANSWERS
A iiNessus iiScanner iicovers iinumerous iicheck, iiincluding iiunique iiCommon
iiVulnerabilities iiand iiExposures ii(CVEs), iiand iisuccessfully iioperates iiacross iidifferent
iienvironments. iiWhat iielse iidoes iiit iido? ii- iiAnswers ii-Serves iias iian iiactive iivulnerability
iiscanner, iiEvaluates iiprocesses iirunning iion iithe iihost, iiProbes iithe iihost's iinetwork
iiservices.
What iiare iithe iistandard iiACAS iiComponents? ii- iiAnswers ii-Nessus iiScanner ii&
iiSecurity iiCenter
What iiis iiACAS? ii- iiAnswers ii-Assured iiCompliance iiAssessment iiSolutions.
How iidoes iithe iiAir iiForce iiutilize iiACAS? ii- iiAnswers ii-Detects iiknown iicyber iithreats iion
iienterprise iiassets.
What iikind iiof iiproduct iiis iiACAS? ii- iiAnswers ii-COTS
Where iidoes iiACAS iicome iifrom? ii- iiAnswers ii-Tenable iiNetwork iiSecurity?
What iispecifically iican iiACAS iithrough iiautomated iinetwork iiscanning? ii- iiAnswers ii-
Provides iivulnerability iiscanning, iiapplication iivulnerability iiscanning, iiconfiguration
iiassessment, iidevice iiconfiguration iiassessment, iinetwork iidiscovery, iicompliance
iireporting, ii& iicompliance iiaccountability/enforcement.
What iiare iisome iiof iithe iiSecurity iiCenters iicapabilities? ii- iiAnswers ii-Provides iicomplete
iivisibility iiinto iithe iisecurity iiposture iiof iithe iiIT iiinfrastructure. iiEvaluates iial iivulnerability
iidata iiacross iientire iiIT iiinfrastructure. iiAnalyzes iivulnerabilities, iiprovides iisolutions iito
iisaid iivulnerabilities. iiIllustrates iivulnerability iitrends iiover iitime, iiand iiassesses iirisk.
iiActionable iicontext iifor iieffective iiremediation iiin iiprioritized iiorder iifor iiassessed
iisystems/devices/risks.
What iiare iisome iiof iithe iiACAS iicapabilities? ii- iiAnswers ii-Active iiVulnerability
iiScanning, iiCredentialed iiVulnerability iiScanning, iiReporting, ii& iiEnumeration.
What iiis iia iimajor iiACAS iilimitation iiwhen iivulnerabilities iiare iifound iiin iithe iireports iiit
iigenerates? ii- iiAnswers ii-ACAS iicannot iiapply iipatches iior iialter iiconfiguration iisettings,
iionly iireports iiscan iifindings.
What iiis iia iimajor iiACAS iilimitation iiin iiregards iito iifunctionality iiand iiwork iistoppage? ii-
iiAnswers ii-Too iimany iiconcurrent iitasks iican iioverload/lock iidatabases iiand iicease
iifunctions.
QUESTIONS AND ANSWERS
A iiNessus iiScanner iicovers iinumerous iicheck, iiincluding iiunique iiCommon
iiVulnerabilities iiand iiExposures ii(CVEs), iiand iisuccessfully iioperates iiacross iidifferent
iienvironments. iiWhat iielse iidoes iiit iido? ii- iiAnswers ii-Serves iias iian iiactive iivulnerability
iiscanner, iiEvaluates iiprocesses iirunning iion iithe iihost, iiProbes iithe iihost's iinetwork
iiservices.
What iiare iithe iistandard iiACAS iiComponents? ii- iiAnswers ii-Nessus iiScanner ii&
iiSecurity iiCenter
What iiis iiACAS? ii- iiAnswers ii-Assured iiCompliance iiAssessment iiSolutions.
How iidoes iithe iiAir iiForce iiutilize iiACAS? ii- iiAnswers ii-Detects iiknown iicyber iithreats iion
iienterprise iiassets.
What iikind iiof iiproduct iiis iiACAS? ii- iiAnswers ii-COTS
Where iidoes iiACAS iicome iifrom? ii- iiAnswers ii-Tenable iiNetwork iiSecurity?
What iispecifically iican iiACAS iithrough iiautomated iinetwork iiscanning? ii- iiAnswers ii-
Provides iivulnerability iiscanning, iiapplication iivulnerability iiscanning, iiconfiguration
iiassessment, iidevice iiconfiguration iiassessment, iinetwork iidiscovery, iicompliance
iireporting, ii& iicompliance iiaccountability/enforcement.
What iiare iisome iiof iithe iiSecurity iiCenters iicapabilities? ii- iiAnswers ii-Provides iicomplete
iivisibility iiinto iithe iisecurity iiposture iiof iithe iiIT iiinfrastructure. iiEvaluates iial iivulnerability
iidata iiacross iientire iiIT iiinfrastructure. iiAnalyzes iivulnerabilities, iiprovides iisolutions iito
iisaid iivulnerabilities. iiIllustrates iivulnerability iitrends iiover iitime, iiand iiassesses iirisk.
iiActionable iicontext iifor iieffective iiremediation iiin iiprioritized iiorder iifor iiassessed
iisystems/devices/risks.
What iiare iisome iiof iithe iiACAS iicapabilities? ii- iiAnswers ii-Active iiVulnerability
iiScanning, iiCredentialed iiVulnerability iiScanning, iiReporting, ii& iiEnumeration.
What iiis iia iimajor iiACAS iilimitation iiwhen iivulnerabilities iiare iifound iiin iithe iireports iiit
iigenerates? ii- iiAnswers ii-ACAS iicannot iiapply iipatches iior iialter iiconfiguration iisettings,
iionly iireports iiscan iifindings.
What iiis iia iimajor iiACAS iilimitation iiin iiregards iito iifunctionality iiand iiwork iistoppage? ii-
iiAnswers ii-Too iimany iiconcurrent iitasks iican iioverload/lock iidatabases iiand iicease
iifunctions.